Kyle Cucci (@d4rksystem) 's Twitter Profile
Kyle Cucci

@d4rksystem

Threat Research @proofpoint | Author of "Evasive Malware" @nostarch | Talks about cybercrime, threat intel, and malware stuff.

ID: 3697039756

linkhttps://securityliterate.com calendar_today18-09-2015 13:42:10

2,2K Tweet

5,5K Followers

538 Following

CyberSecSac & DC916 (@cybersec916) 's Twitter Profile Photo

Don’t forget we have our next meeting Jan 8th! We have goodies we’re giving away 💜 Join the meeting for a chance to win: 💻1 month hackthebox subscription 📖Physical Book: Evasive Malware - A Field Guide to Detecting, Analyzing, and Defeating Advanced Threats

Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

This one is going to be a good one, and Hannah is one of my favorite people to work with 🥳 Definitely give it a listen.

Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

I recently added some new additions to #VMWareCloak! Go check it out if you want harden your #malware analysis VM's or if you just want to learn about some of the different ways malware can detect VMware! Thanks to MMJv3 for the new ideas! github.com/d4rksystem/VMw…

Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

If you’ve read my book Evasive Malware (from No Starch Press), consider leaving a review where you bought it (Amazon, Goodreads, that questionable site you found, etc.). Good reviews = more readers. Bad reviews? Still helpful 😁 Either way, it helps me improve. #EvasiveMalware

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

BackConnect malware is the latest tool in Black Basta's arsenal of social engineering, Microsoft Teams abuse, and legitimate tool exploitation. Read Trend Micro's full analysis of ransomware attackers’ tactics: ⬇️ research.trendmicro.com/4hVrz9s

BackConnect malware is the latest tool in Black Basta's arsenal of social engineering, Microsoft Teams abuse, and legitimate tool exploitation.  
 
Read Trend Micro's full analysis of ransomware attackers’ tactics: ⬇️ research.trendmicro.com/4hVrz9s
Saher Naumaan (@saffronsec) 's Twitter Profile Photo

My first blog with Proofpoint is live! And we love a good crossover. State-sponsored actors try their hand at ClickFix - the hottest thing in cybercrime. Meet the North Koreans, Iranians, and Russians who are upping their social engineering game proofpoint.com/us/blog/threat…

Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

If you’ll be at Botconf next week, feel free to reach out! Looking forward to seeing you all and talking about malware and other bad stuff 🤓

If you’ll be at <a href="/Botconf/">Botconf</a> next week, feel free to reach out! Looking forward to seeing you all and talking about malware and other bad stuff 🤓
Kseniia \n (@naumovax) 's Twitter Profile Photo

Just look at my happy face :) So, my speech ended, thank you very much for coming and listening! I hope it was interesting 😇 You can watch my talk “Tricky obfuscation techniques for C2 communication? Just detect them all!” here ➡️ youtube.com/live/ORoYAH960…

Just look at my happy face :)
So, my speech ended, thank you very much for coming and listening! I hope it was interesting 😇

You can watch my talk “Tricky obfuscation techniques for C2 communication? Just detect them all!” here ➡️
youtube.com/live/ORoYAH960…
Threat Insight (@threatinsight) 's Twitter Profile Photo

Today, @Proofpoint joins the cybersecurity community and the U.S. and international law enforcement in celebrating the disruption of #DanaBot, a malware-as-a-service used by sophisticated cybercriminals since 2018. brnw.ch/21wSRik

Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

Thanks to all the organizers of Botconf for an amazing conference this year! I got to see many old friends and meet a lot of new ones 😀 And thanks to everyone who attended my talk and workshop on malware evasion techniques 🤓 Until next year!

Thanks to all the organizers of <a href="/Botconf/">Botconf</a> for an amazing conference this year! I got to see many old friends and meet a lot of new ones 😀

And thanks to everyone who attended my talk and workshop on malware evasion techniques 🤓

Until next year!
Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

I often am asked for pointers on building a VM for malware analysis. I wrote a 40+ page chapter on this in my book Evasive Malware. You can download this chapter from the book on my blog for free here: evasivemalware.com/EvasiveMalware… Thanks No Starch Press for allowing me to give it away 🤓

Lena (@lambdamamba) 's Twitter Profile Photo

The Call for Sponsors for Malware Village at @DEFCON 33 is now open! 📣 📄 Sponsor Package: malwarevillage.org/sponsor.pdf 📧 Email: [email protected] Please consider sponsoring us, so we can make #MalwareVillage at #DC33 a legendary event! 🤩

The Call for Sponsors for <a href="/MalwareVillage/">Malware Village</a> at @DEFCON 33 is now open! 📣

📄 Sponsor Package: malwarevillage.org/sponsor.pdf

📧 Email: contact@worldcyber.health 

Please consider sponsoring us, so we can make #MalwareVillage at #DC33 a legendary event! 🤩
Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

At Proofpoint, we were originally tracking this stealer as “Aurotun”, which I dubbed after a misspelling in its config. Thanks to some collab with other researchers, we now believe this to be #MonsterV2.

scsideath (@cybersyrupblog) 's Twitter Profile Photo

The Call for Sponsors for #MalwareVillage at @DEFCON 33 is now open! 📣 📄 Sponsor Package: malwarevillage.org/sponsor.pdf 📧 Email: [email protected] Sponsors are what make events like Malware Village possible! We’re looking forward to working with our sponsors! 🙏 #DC33

The Call for Sponsors for #MalwareVillage at @DEFCON 33 is now open! 📣

📄 Sponsor Package: malwarevillage.org/sponsor.pdf

📧 Email: contact@worldcyber.health 

Sponsors are what make events like Malware Village possible!

We’re looking forward to working with our sponsors! 🙏

#DC33
Adam Rackis (@adamrackis) 's Twitter Profile Photo

“when AI just writes entire codebases, even the best IDE becomes irrelevant” * checks profile * ceo of some ai startup. every. time.